Showing headlines posted by linuxer
( 1 2 3 4 5 6 ... 33 ) Next »How to Install Safari on Linux
Safari, a popular web browser developed by Apple, is designed primarily for macOS and iOS devices. However, Linux users may want to experience Safari for testing purposes or simply out of curiosity. While Safari is not officially available for Linux, it can still be installed using tools like PlayOnLinux and Wine. This guide walks you through the steps to install Safari on your Linux system.
How to Make a Bash Script Wait for a Command to Finish
In the world of automation and scripting, the ability to manage background processes is crucial for effective task execution. This tutorial will guide you through the process of creating a Bash script that starts a background task and efficiently waits for it to finish before proceeding with further commands. By leveraging the process ID (PID) of the background job and the wait command, you can ensure controlled execution flow and resource management.
Keep Alive Bash Script Example
In the world of Linux and system administration, maintaining persistent connections is often crucial for managing remote servers. The Keep Alive mechanism serves as a vital tool to prevent disconnection from idle sessions, especially in SSH connections. This article will provide you with a straightforward Bash script example that keeps your session alive, ensuring you can manage your tasks without interruptions.
Bash Script to Find Alive Hosts on Your Network
In today’s interconnected world, knowing the active devices on your network can be essential for various administrative tasks and security measures. One efficient way to scan for alive hosts is by using a Bash script that pings every IP address within a specified subnet. This article will guide you through writing such a script, starting from the prerequisites to executing it on your machine.
How To Lock File Bash Script Example
In the world of programming and scripting, managing files securely is crucial. If you’re using Bash for your scripts, you might need to implement file locking to prevent multiple processes from accessing the same file simultaneously. This article will guide you through creating a Bash script that demonstrates how to lock a file effectively.
Password cracking with John the Ripper on Linux
John the Ripper is one of the most powerful password cracking tools available on Linux systems. It remains so popular because it is relatively simple to use, it supports many different types of password hashes, and will brute force almost any type of password.
Positional Arguments in Bash Scripts Example
Bash scripting is an essential skill for anyone looking to automate tasks in a Linux environment. One of the powerful features of Bash scripts is the use of positional arguments, which allows you to pass data directly to your scripts from the command line. This article will guide you through the basics of using positional arguments, specifically focusing on how to utilize variables like $1, $2, and beyond, to enhance your scripting capabilities.
Bubble Sort Example Using Bash Script
Learn how to implement a Bubble Sort algorithm using Bash scripting. Bubble Sort is a simple sorting technique that repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order. This article provides a complete example, including a script, sample data, and an explanation of the logic.
Bash Script Goto Label Example: How to Simulate Label-Based Navigation
Learn how to simulate the goto functionality in Bash scripts using label-based navigation. This approach leverages structured techniques like case statements to replicate the behavior of jumping between labels, offering a cleaner and more maintainable alternative to traditional goto logic.
Bash Script Flags Without Arguments: How to Use and Parse Them
Flags in Bash scripts are crucial for modifying the behavior of scripts without needing to pass lengthy arguments. Particularly, flags without arguments provide a simple way to enable or disable features in your scripts, often making your scripts more user-friendly and easier to use.
How to Secure GRUB Boot Loader with Password
The GRUB boot loader plays a critical role in booting Linux systems, serving as the first program executed when the computer starts. Securing GRUB with a password can prevent unauthorized users from tampering with boot parameters or gaining root access to the system. This is especially important for systems that require heightened security.
Protecting Data Integrity on Ext4 and XFS with dm-integrity and LUKS
Unlike COW filesystems like BTRFS and ZFS, traditional Linux filesystems like ext4 and XFS have no way to detect slow data degradation (also known as bitrot), since they don’t perform data checksumming. When using those filesystems, however, we can store and verify integrity information at the block level, using dm-integrity. In this tutorial, we learn how to create dm-integrity devices with the integritysetup utility, and when creating LUKS containers, using cryptsetup.
Findmnt Command: Querying Filesystems in Linux Made Easy
Findmnt is a free and open source utility usually included in the core packages of all the major Linux distributions. It is able to list all mounted filesystems or retrieve data for only those we specify. In this tutorial, we learn how to use findmnt, and how to query filesystems by type, mount options and other parameters.
How to Install KDE Plasma on Linux Mint
Linux Mint is a popular Linux distribution known for its simplicity and user-friendliness. While it primarily comes with Cinnamon, MATE, or Xfce desktop environments, users may prefer the polished and highly customizable KDE Plasma. This tutorial will guide you through the steps to install KDE Plasma on Linux Mint regardless of your Linux Mint version.
Using flock in Bash Scripts: Manage File Locks and Prevent Task Overlaps
Managing concurrent processes in a Bash script can be a challenging endeavor, especially when tasks need to be executed without overlap. This is where file locking comes into play. In this article, we will explore how to use the flock command in Bash scripts to create file locks, ensuring that only one instance of a task can run at a time. This capability prevents unexpected behaviors and resource contention, making our scripts safer and more reliable.
Bash Script as a Simple To-Do List
Creating a simple to-do list is a common task that can be accomplished using various programming languages. One straightforward option is to utilize a Bash script, which allows users to create, view, and manage tasks right from the command line. This article will guide you through setting up a simple to-do list using a Bash script.
Binary Clock with Bash Script
A binary clock is a creative way to display time using binary numbers instead of decimal digits. This article will guide you through creating a simple binary clock using a Bash script. You’ll see how this script can run directly in your terminal, offering a unique alternative to traditional clocks.
How to install Ubuntu on Windows
If you currently use Windows as your primary operating system, but feel that you are missing out on some important Linux features, it is possible to install Ubuntu on Windows through the WSL (Windows Subsystem for Linux) feature.
How to resize ext4 root partition live without umount on Linux
It is possible to resize the root partition in Linux, even if you are actively booted into the installation that resides on the partition. Ordinarily, hard drive partitioning changes should only be carried out on unmounted partitions and hard drive space that is not being actively used.
SSHuttle: A VPN-Like Tool for Secure Traffic Routing
SSHuttle is a powerful, VPN-like tool that allows Linux users to securely route network traffic through a remote server using SSH. It is ideal for scenarios where you need secure traffic encryption, bypassing firewalls, or accessing restricted resources without the overhead of setting up a full-fledged VPN.